header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Smartblog remote SQL injection exploit

A remote SQL injection vulnerability exists in Smartblog. An attacker can send a specially crafted HTTP request to the vulnerable script and execute arbitrary SQL commands in the back-end database, allowing the attacker to bypass authentication and gain access to sensitive data. The vulnerable parameter is 'idt' which is located in the 'index.php' script.

BlogMe PHP remote SQL injection exploit

An attacker can exploit a SQL injection vulnerability in BlogMe PHP to gain access to the database. The exploit involves sending a maliciously crafted HTTP request to the comments.php page with an ID parameter set to -1 UNION SELECT 1,2,3,4,5,6,aes_decrypt(aes_encrypt(user(),0x71),0x71)-- OR -1 UNION SELECT 1,2,unhex(hex(database())),4,5,6,7--.

ActualAnalyzer Lite (free) 2.78 LOCAL FILE INCLUSION

A vulnerability exists in ActualAnalyzer Lite (free) 2.78 which allows an attacker to include a file from the local file system. The vulnerability is due to insufficient sanitization of user-supplied input to the 'style' parameter in 'admin.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with directory traversal sequences (e.g. '../') to the vulnerable script. This can allow the attacker to include and execute arbitrary local files on the vulnerable system.

Joomla com_webhosting Blind SQL Injection

This script will exploit a Blind SQL Injection Vulnerability in Joomla com_webhosting. It uses a Perl script to send a GET request to the target server with a malicious SQL query. The malicious query is crafted to extract data from the database by using the SUBSTRING function. The script then checks the response for a certain string, which indicates whether the query was successful or not.

interact 2.4.1 Multiple Remote RFI Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'CONFIG[LANGUAGE_CPATH]' and 'CONFIG[BASE_PATH]' parameters to the 'embedforum.php' and 'lib.inc.php' scripts respectively. This can be exploited to execute arbitrary PHP code by including a remote file via a URL in these parameters.

Harris Wap Chat Remote File Include Vulnerability

Multiple scripts in Harris Wap Chat are vulnerable to remote file include vulnerability. An attacker can exploit this vulnerability by sending a maliciously crafted URL to the vulnerable application. This will allow the attacker to execute arbitrary code on the vulnerable system.

OxYProject 0.85 (edithistory.php) Remote Code Execution Vulnerability

A vulnerability exists in OxYProject 0.85 (edithistory.php) which allows an attacker to execute arbitrary code on the vulnerable system. The vulnerability is due to the application not properly sanitizing user-supplied input. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow the attacker to execute arbitrary code on the vulnerable system.

Project Based Calendaring System (PBCS) Version 0.7.1 Multiple Vulnerabilities

PBCS Version 0.7.1 is vulnerable to Remote File Upload, Remote File Disclosure, and File Disclosure. An attacker can exploit these vulnerabilities to upload malicious files, disclose sensitive information, and gain access to the system.

LokiCMS 0.3.3 <= Arbitrary File Delete Vulnerability

LokiCMS 0.3.3 is vulnerable to an arbitrary file delete vulnerability. An attacker can delete any file on the server by sending a specially crafted HTTP request to the admin.php page. This can be used to delete critical files such as the Config.php file, which will cause users to be unable to view the index page normally and will only see errors.

Recent Exploits: